Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
42101
Teachers’ Perspectives on Teaching and Learning during the Pandemic in the United States
Published 2022-09-01“…Conclusion – Student engagement during remote learning indicate the need for educators and technology designers to begin to consider the future of learning in online formats among younger children.…”
Get full text
Article -
42102
Traveling Waves for Delayed Cellular Neural Networks with Nonmonotonic Output Functions
Published 2014-01-01Get full text
Article -
42103
Research on multi-channel routing threats and defense for cognitive ad hoc network
Published 2016-10-01“…In the environment of scarce spectrum resources,cognitive ad hoc network which is independent with infrastruc-ture and fixed spectrum allocation policy,has been also developed quickly.Due to the characteristic of multi-channel routing,cognitive ad hoc network is commonly perceived as an environment offering both opportunities and threats.To further un-derstand the multi-channel routing threats,the current research situation and development trend,the types of threats were analyzed in terms of the node routing and the multi-channel selection,and several typical security methods were concluded.Meanwhile,the most important solution to keep the security of cognitive radio network was found to build trust relationship among cognitive users.Trust management was just the basic technology to solve the security problems of multi-channel routing.Finally,the current problems of related works and research trends in this area were discussed.…”
Get full text
Article -
42104
On the Principles and Decisions of New Word Translation in Sino-Japan Cross-Border e-Commerce: A Study in the Context of Cross-Cultural Communication
Published 2023-01-01“…In the context of the rapid development of multimedia and information technology, machine translation plays an indispensable role in cross-border e-commerce between China and Japan. …”
Get full text
Article -
42105
Synthesis of Symmetrical Silane Containing PO Bonds and Their Passivation of Perovskites
Published 2025-01-01Get full text
Article -
42106
Heat-Fluid-Solid-Coupled Model for Flue Gas Displacement of CH4 in Coal Seams and Its Applications
Published 2025-01-01Get full text
Article -
42107
Realistic challenges and path options for the high-quality development of smart stadiums in China
Published 2025-01-01“…The study finds that the problems of high-quality construction of smart stadiums in China include: information technology treats the masses as a tame object and a test object for the safety valve, there is a paradox between algorithmic "de-deviation" and "personalised" sports services, and there is a lack of product standards and construction standards for smart stadium facilities. …”
Get full text
Article -
42108
-
42109
CHARACTERISTICS OF ORGANIZATIONAL STRUCTURE OF BOSNIAN AND HERZEGOVINIAN COMPANIES
Published 2013-11-01“… The technological revolution (especially in the field of information and communications technology) and globalization are the key factors in shaping the new competitive landscape which is characterized by hypercompetition, increasing consumer demands and increasing demands for innovation, knowledge and learning. …”
Get full text
Article -
42110
Supply Chain Management Skills in Business and Humanitarian Contexts
Published 2024-12-01“…Significant discrepancies were found: humanitarian SCM prioritizes functional logistics, while business SCM places a larger emphasis on information technology, customs, transportation, and port/airport management. …”
Get full text
Article -
42111
Retinopathy Diabetic Recognition and Detection Using Novel Intelligent Algorithms
Published 2023-06-01Get full text
Article -
42112
Microwave Dielectric Study of Tetramethylurea and N, N-Dimethylacetamide Binary Mixture in Benzene
Published 2011-01-01Get full text
Article -
42113
Output Feedback Control for Asymptotic Stabilization of Spacecraft with Input Saturation
Published 2017-01-01Get full text
Article -
42114
A Novel Optimization Method for Nonconvex Quadratically Constrained Quadratic Programs
Published 2014-01-01Get full text
Article -
42115
Research on Analytical Model of Magnetic Torques Between Magnetic Tubes
Published 2024-12-01“…Magnetic forces and torques between permanent magnets are the focus of the research on the magnetic drive technology. At present, many studies focus on establishing analytical models with three or four degrees of freedom to solve magnetic torques, but their applications have certain limitations. …”
Get full text
Article -
42116
Improvement of SRv6 SID structure
Published 2020-04-01“…IPv6-based segment routing (SRv6) is a new technology addressed by IETF in recent years.In draft-ietf-spring-srv6-network-programming,the 128-bit segment identifier (SID) was structured,and how to be processed in one node was described.The SID structure defined by the draft was improved.A field named “network”was defined in the SID to identify different virtual sub-networks.It was also pointed out that the SID list in the segment routing header (SRH) did not carry the “Network”,and only carried the locator,function and argument,which could effectively reduce the requirements of the multi-layer SRv6 segment identifier list requirements on the chip processing capability and reduce the overhead in SRv6 networks.To improve the effective utilization of network bandwidth,and at the same time lay a solid foundation for the use of SRv6 network slicing,and promote the large-scale use of SRv6.…”
Get full text
Article -
42117
Efficient Prediction of Network Traffic for Real-Time Applications
Published 2019-01-01Get full text
Article -
42118
The criminality of juveniles through the prism of criminologically significant manifestations of extremism
Published 2018-04-01“…The main tool that favors the involvement of juveniles in both general criminal and extremist activities is the Internet, which serves as a technology and means of transforming juvenile criminality into concrete criminal manifestations.…”
Get full text
Article -
42119
Research on multi-UAV energy consumption optimization algorithm for cellular-connected network
Published 2023-02-01“…In complex time-varying environment, the ground base station (GBS) may not assist the UAV.Therefore, a mobile edge computing (MEC) cellular-connected network based on digital twin (DT) technology was studied.Given the efficiency of multi-UAV, multiple high-altitude balloon (HAB) equipped with MEC servers were introduced.On this basis, an energy minimization problem for all UAV was proposed, and a multi-UAV trajectory optimization and resource allocation scheme was presented to solve it.The double deep Q-network (DDQN) was applied to handle the association between multi-UAV and multi-HAB, and the multi-UAV trajectory and computing resource allocation were jointly optimized by the successive convex approximation (SCA) and the block coordinate descent (BCD).Simulation experiments verify the feasibility and effectiveness of the proposed algorithm.The system energy consumption is reduced by 30%, better than the comparison algorithms.…”
Get full text
Article -
42120